ExamGecko
Home Home / Juniper / JN0-682

Juniper JN0-682 Practice Test - Questions Answers, Page 12

Question list
Search
Search

List of questions

Search

Related questions











Devices spine1 and spine have been configured as distributed Layer 3 gateways in the VXLAN topology, and devices leaf1 and leaf3 have been configured as layer 2 gateways. Device host must be able to communicate with device host?

Which two statements are true? (Choose two.)

A.
An IRB interface must be configured on device leaf1 and leaf2.
A.
An IRB interface must be configured on device leaf1 and leaf2.
Answers
B.
An IRB interface must be configured on devices spine1 and spine2.
B.
An IRB interface must be configured on devices spine1 and spine2.
Answers
C.
Traffic from host1 to host2 will transmit the VXLAN tunnel from leaf1 to leaf3.
C.
Traffic from host1 to host2 will transmit the VXLAN tunnel from leaf1 to leaf3.
Answers
D.
Traffic from host1 to host will transit a VXLAN tunnel to spine or spine2 then a VXLAN from spine1 or spine2 to leaf 3.
D.
Traffic from host1 to host will transit a VXLAN tunnel to spine or spine2 then a VXLAN from spine1 or spine2 to leaf 3.
Answers
Suggested answer: B, C

Your manager asks you to secure ARP and DHCP traffic across your local Ethernet links In this scenario, which technology will accomplish this task?

A.
SSL
A.
SSL
Answers
B.
MAC sec
B.
MAC sec
Answers
C.
IPsec
C.
IPsec
Answers
D.
A firewall filter
D.
A firewall filter
Answers
Suggested answer: B

Explanation:

MACsec (Media Access Control Security) is the technology used to secure ARP and DHCP traffic across local Ethernet links. It provides secure, encrypted communication at the MAC layer, ensuring that traffic like ARP and DHCP is protected from eavesdropping and tampering.

Juniper Networks - MACsec Overview

You are creating a new EVPN and are asked to selectively accept certain MAC advertisement routers from your EVPN peers using VXLAN Encapsulation.

Which statements is correct in this scenario?

A.
You can use VRF policies and route distinguisher values to filter out unwanted routes.
A.
You can use VRF policies and route distinguisher values to filter out unwanted routes.
Answers
B.
You can use VBRF import policies and community values to filter out unwanted routes.
B.
You can use VBRF import policies and community values to filter out unwanted routes.
Answers
C.
You can use MAC filtering to filter out unwanted routes.
C.
You can use MAC filtering to filter out unwanted routes.
Answers
D.
You can use firewall filters to filters out unwanted routes
D.
You can use firewall filters to filters out unwanted routes
Answers
Suggested answer: B

Explanation:

In an EVPN environment, VRF (Virtual Routing and Forwarding) import policies along with community values can be used to selectively accept certain MAC advertisement routes. These policies can be configured to include or exclude specific routes based on community values, allowing for granular control over the routes accepted from EVPN peers.

Juniper Networks - EVPN for VXLAN Configuration Guide

What are the two valid types of VXLAN signaling?(Choose two.)

A.
EVPN
A.
EVPN
Answers
B.
RSVP
B.
RSVP
Answers
C.
RSTP
C.
RSTP
Answers
D.
MPLS
D.
MPLS
Answers
Suggested answer: A, B

Explanation:

https://www.juniper.net/documentation/us/en/software/junos/evpn-vxlan/topics/concept/data-center-interconnect-evpn-vxlan-evpn-mpls-wan-overview.html

Which two statements describe a VXLAN network identifier (VNI)? (Choose Two)

A.
A VNI identifies the inner MAC frame.
A.
A VNI identifies the inner MAC frame.
Answers
B.
A VNI identifies a VXLAN segment ID.
B.
A VNI identifies a VXLAN segment ID.
Answers
C.
A VNI allows only 512 VLANs.
C.
A VNI allows only 512 VLANs.
Answers
D.
A VNI validates the remote VTEP.
D.
A VNI validates the remote VTEP.
Answers
Suggested answer: B, D

Explanation:

A VXLAN Network Identifier (VNI) is crucial in VXLAN as it identifies a specific VXLAN segment, allowing for traffic segregation and logical network partitioning within the same physical infrastructure. VNIs also play a role in validating remote VTEPs (VXLAN Tunnel Endpoints) as part of the VXLAN encapsulation and decapsulation process.

Juniper Networks - VXLAN Overview

Referring to the exhibit, not all routes are being exchanged by EBGP peers.

In this scenario, which BGP parameter would solve this problem?

A.
mulcihop
A.
mulcihop
Answers
B.
mulcipach
B.
mulcipach
Answers
C.
mulcipach mulciple-as
C.
mulcipach mulciple-as
Answers
D.
as-override
D.
as-override
Answers
Suggested answer: D

Refer to the exhibit.

Referring to the exhibit, which two statements are correct in a seamless EVPN-VXLAN stitching DCI design? (Choose two.)

A.
The 00:21:22:23:24:25:26:27:28:22 value represents the interconnect ESI.
A.
The 00:21:22:23:24:25:26:27:28:22 value represents the interconnect ESI.
Answers
B.
The 10.1.1.2 host is reachable in a remote data center POD.
B.
The 10.1.1.2 host is reachable in a remote data center POD.
Answers
C.
The 10.1.1.1 host is reachable in a remote data center POD.
C.
The 10.1.1.1 host is reachable in a remote data center POD.
Answers
D.
The 00:21:22:23:24:25:26:27:28:22 value represents the local ESI.
D.
The 00:21:22:23:24:25:26:27:28:22 value represents the local ESI.
Answers
Suggested answer: A, C

You are implementing a second data center and must have some of your VLANs active in both data centers. You must provide high availability, fast reconvergence, and avoid tromboning traffic on these VLANs.

In an over-the-top DCI strategy, which two statements are correct? (Choose two.)

A.
A single type-5 route for the subnet must be advertised from both data centers.
A.
A single type-5 route for the subnet must be advertised from both data centers.
Answers
B.
The VLAN ID and VNI must be the same in both data centers for these VLANs.
B.
The VLAN ID and VNI must be the same in both data centers for these VLANs.
Answers
C.
The VLAN ID must be the same in both data centers, but the VNI can be different.
C.
The VLAN ID must be the same in both data centers, but the VNI can be different.
Answers
D.
A type-5 route for each host must be advertised from the data center where the host resides.
D.
A type-5 route for each host must be advertised from the data center where the host resides.
Answers
Suggested answer: A, B

You must advertise reachability between two firewalls with unique IP subnets that terminate security services through your EVPN-VXLAN environment.

In this scenario, which EVPN route type should you enable to accomplish this task?

A.
type-4
A.
type-4
Answers
B.
type-2
B.
type-2
Answers
C.
type-5
C.
type-5
Answers
D.
type-3
D.
type-3
Answers
Suggested answer: B

Refer to the exhibit.

Which statement is correct about the highlighted code segment and VXLAN frame shown in the exhibit?

A.
This statement is optional and keeps the VLAN header in the Original L2 Frame, if included.
A.
This statement is optional and keeps the VLAN header in the Original L2 Frame, if included.
Answers
B.
This statement is optional and removes the VLAN header in the Original L2 Frame, if included.
B.
This statement is optional and removes the VLAN header in the Original L2 Frame, if included.
Answers
C.
This statement is required and removes the VLAN header in the Original L2 Frame, if included.
C.
This statement is required and removes the VLAN header in the Original L2 Frame, if included.
Answers
D.
This statement is required and keeps the VLAN header in the Original L2 Frame, if included.
D.
This statement is required and keeps the VLAN header in the Original L2 Frame, if included.
Answers
Suggested answer: A
Total 154 questions
Go to page: of 16